首页 | 本学科首页   官方微博 | 高级检索  
     

一种无轮廓像干扰光学加密系统
引用本文:秦怡,巩琼,李根全,杨兴强.一种无轮廓像干扰光学加密系统[J].中国激光,2012,39(12):1209002-189.
作者姓名:秦怡  巩琼  李根全  杨兴强
作者单位:秦怡:南阳师范学院物理与电子工程学院, 河南 南阳 473061
巩琼:南阳师范学院物理与电子工程学院, 河南 南阳 473061
李根全:南阳师范学院物理与电子工程学院, 河南 南阳 473061
杨兴强:南阳师范学院物理与电子工程学院, 河南 南阳 473061
基金项目:河南省科技厅科技攻关项目(112102210386)和南阳师范学院高层次人才启动资金项目(nytc2006k100)资助课题。
摘    要:将光学中的干涉与衍射原理相结合,提出了一种新的光学加密系统。该光学加密系统将图像信息隐藏于两个相位板(POM)及一个振幅板(AOM)中,其中振幅板使用计算机随机生成,两个相位板则通过解析方法得到。解密时,使用相干光照射两个相位板,并通过分束镜使二者的衍射光场进行相干叠加,此干涉场被振幅板调制,再经衍射一段距离后所得衍射场强度即为原始图像,此图像可以采用CCD等图像传感器件直接记录。本方法不但消除了先前提出的基于干涉原理加密方法存在的"轮廓像"问题,也对部分密钥泄露攻击具有很强的稳健性,具有较高的安全性。此外,本方法原理简单,加密过程无需迭代,解密系统易于物理实现。计算机模拟结果证实了本方法的有效性。

关 键 词:图像处理  光学加密  干涉及衍射原理  轮廓像问题  暴力攻击
收稿时间:2012/7/26

An Optical Encryption Method with Silhouette Removal
Qin Yi Gong Qiong Li Genquan Yang Xingqiang.An Optical Encryption Method with Silhouette Removal[J].Chinese Journal of Lasers,2012,39(12):1209002-189.
Authors:Qin Yi Gong Qiong Li Genquan Yang Xingqiang
Affiliation:Qin Yi Gong Qiong Li Genquan Yang Xingqiang(College of Physics and Electronic Engineering,Nanyang Normal University,Nanyang,Henan 473061,China)
Abstract:A novel optical encryption system is proposed by combining the optical principle of interference and diffraction. In this system, the original image is hidden into three masks, including two phase only masks (POMs) and one amplitude only mask (AOM). The AOM is randomly generated by computer while the POMs are obtained analytically. For decryption, the diffraction field of the two POMs is first superposed by utilizing the beam splitters and then modulated by the amplitude mask. After that the wavefront propagates for a certain distance and the intensity of the complex field, which is exactly the original image, can be recorded by CCD camera. Compared with the existing interference-based method, the approach is simple and easy to be realized by optical elements. Moreover, the silhouette problem that exists in the method with two POMs can be solved in our method. At the same time, the proposal is also proved to be robust to partial key exposure attack. Simulation results are presented to verify the validity of the proposed approach.
Keywords:image processing  optical encryption  principle of interference and diffraction  silhouette problem  brute force attack
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号